Question
Download Solution PDFMatch the LIST-I with LIST-II
LIST - I (Malware term) |
LIST - II (Definition) |
||
A. |
Payload |
I. |
A program that can replicate itself and travels over network |
B. |
Worm |
II. |
Scam in which a perpetrator sends an official looking email message that attempts to obtain personal and/or financial information |
C. |
Phishing |
III. |
Destructive event or prank, a virus was created to deliver |
D. |
Spamming |
IV. |
E-mailing an unsolicited message to many people at the same time |
Choose the correct answer from the options given below:
Answer (Detailed Solution Below)
Option 2 : A - III, B - I, C - II, D - IV
Detailed Solution
Download Solution PDFThe correct answer is - Option 2
Key Points
- Payload
- A destructive event or prank that a virus is created to deliver.
- Worm
- A program that can replicate itself and travels over a network.
- Phishing
- A scam in which a perpetrator sends an official-looking email message that attempts to obtain personal and/or financial information.
- Spamming
- E-mailing an unsolicited message to many people at the same time.
Additional Information
- Malware
- Malware is a term used to describe malicious software designed to cause damage to a computer, server, or network.
- Common types of malware include viruses, worms, Trojan horses, ransomware, spyware, adware, and more.
- Viruses
- A type of malware that attaches itself to a legitimate program or file and spreads from one computer to another.
- Viruses can cause harm by corrupting, deleting, or stealing data.
- Spam
- Unsolicited bulk messages sent over the internet, typically to a large number of users, for the purposes of advertising, phishing, spreading malware, etc.
- Spam can come in various forms, including email spam, social media spam, and messaging app spam.